ExamGecko
Home Home / Cisco / 400-007

Cisco 400-007 Practice Test - Questions Answers, Page 17

Question list
Search
Search

List of questions

Search

Related questions











When an SDN-based model is used to transmit multimedia traffic, which aspect should an architect consider while designing the network?

A.

QoE estimation

A.

QoE estimation

Answers
B.

security

B.

security

Answers
C.

traffic patterns

C.

traffic patterns

Answers
D.

flow forwarding

D.

flow forwarding

Answers
Suggested answer: A

Various teams in different organizations within an enterprise are preparing low-level design documents to capture network parameters using a Waterfall project model:

• hardware sizing and power consumption

• Layer 2 and layer 3 services parameters

• configuration of all control plane protocols

Input from relevant stakeholders was captured at the start of the project, and the project scope has been defined based on the parameters above. What impact will it have on documentation and project deliverables if the stakeholders ask to have changes carried out in the network before the information has been captured?

A.

This provides more opportunity to think outside the box.

A.

This provides more opportunity to think outside the box.

Answers
B.

Rework is expected before the delivery.

B.

Rework is expected before the delivery.

Answers
C.

Significant effort and time are required.

C.

Significant effort and time are required.

Answers
D.

This provides a flexible approach to incorporate changes.

D.

This provides a flexible approach to incorporate changes.

Answers
Suggested answer: B

A network security team observes phishing attacks on a user machine from a remote location. The organization has a policy of saving confidential data on two different systems using different types of authentication. What is the next step to control such events after the security team verifies all users in Zero Trust modeling?

A.

Enforce risk-based and adaptive access policies.

A.

Enforce risk-based and adaptive access policies.

Answers
B.

Assess real-time security health of devices.

B.

Assess real-time security health of devices.

Answers
C.

Apply a context-based network access control policy for users.

C.

Apply a context-based network access control policy for users.

Answers
D.

Ensure trustworthiness of devices.

D.

Ensure trustworthiness of devices.

Answers
Suggested answer: D

A product manufacturing organization is integrating cloud services into their IT solution The IT team is working on the preparation phase of the implementation approach, which includes the Define Strategy step. This step defines the scope of IT, the application, and the service What is one topic that should be considered in the Define Strategy step?

A.

financial and governance models

A.

financial and governance models

Answers
B.

innovate and align with business according to volume

B.

innovate and align with business according to volume

Answers
C.

due diligence and financial scenarios

C.

due diligence and financial scenarios

Answers
D.

contingency exit strategy steps

D.

contingency exit strategy steps

Answers
Suggested answer: A

During evaluation of migrating current on premises infrastructure to add cloud-based infrastructure, a network planning team must meet three core requirements as they make recommendations on which cloud strategy to adopt going forward

• Technology is changing rapidly, therefore the enterprise must be open to adopting new ways of doing things, and be ready to invest CapEx-funds in the next three years

• Network bandwidth capacity requirements are dynamic and are expected to change over the next year

• If new technologies are to be introduced, operational expenses must be kept at a minimum. Which cloud strategy meets these requirements?

A.

private

A.

private

Answers
B.

hybrid

B.

hybrid

Answers
C.

public

C.

public

Answers
D.

multicloud

D.

multicloud

Answers
Suggested answer: D

Company XYZ is revisiting the security design for their data center because they now have a requirement to control traffic within a subnet and implement deep packet inspection Which technology meets the updated requirements and can be incorporated into the design?

A.

routed firewall

A.

routed firewall

Answers
B.

VLAN ACLs on the switch

B.

VLAN ACLs on the switch

Answers
C.

transparent firewall

C.

transparent firewall

Answers
D.

zone-based firewall on the Layer 3 device

D.

zone-based firewall on the Layer 3 device

Answers
Suggested answer: C

Hybrid cloud computing allows organizations to like advantage of public and private cloud models Which best practice should organizations follow to ensure data security in the private cloud?

A.

Use standard protocols for data transmission over the network.

A.

Use standard protocols for data transmission over the network.

Answers
B.

Encrypt data when it is at rest and in motion

B.

Encrypt data when it is at rest and in motion

Answers
C.

Communicate all data security risks to customers and end users.

C.

Communicate all data security risks to customers and end users.

Answers
D.

Use standard network protocols for data communication between unsecured network connections.

D.

Use standard network protocols for data communication between unsecured network connections.

Answers
Suggested answer: B

A financial company requires that a custom TCP-based stock-trading application be prioritized over all other traffic for the business due to the associated revenue. The company also requires that VoIP be prioritized for manual trades.

Which directive should be followed when a QoS strategy is developed for the business?

A.

Allow VoIP and the custom application to share the same priority queue,

A.

Allow VoIP and the custom application to share the same priority queue,

Answers
B.

The custom application and VoIP must be assigned their own separate priority queue.

B.

The custom application and VoIP must be assigned their own separate priority queue.

Answers
C.

Interleave the custom application with other TCP applications in the same CBWR

C.

Interleave the custom application with other TCP applications in the same CBWR

Answers
D.

Avoid placing the custom application in a CBWFQ queue that contains other

D.

Avoid placing the custom application in a CBWFQ queue that contains other

Answers
Suggested answer: B

An engineer is designing a DMVPN network where OSPF has been chosen as the routing protocol A spoke-to-spoke 'J<ita propagation model must be set up Which two design considerations must be taken into account? (Choose two )

A.

Configure all the sites as network type broadcast

A.

Configure all the sites as network type broadcast

Answers
B.

The network type on all sites should be point-to-multipoint

B.

The network type on all sites should be point-to-multipoint

Answers
C.

The network type should be point-to-multipoint for the hub and point-to-point for the spokes.

C.

The network type should be point-to-multipoint for the hub and point-to-point for the spokes.

Answers
D.

The hub should be set as the DR by specifying the priority to 255.

D.

The hub should be set as the DR by specifying the priority to 255.

Answers
E.

The hub should be the DR by changing the priority of the spokes to 0.

E.

The hub should be the DR by changing the priority of the spokes to 0.

Answers
Suggested answer: A, E

Which two characteristics are associated with 802 1s? (Choose two)

A.

802.1s supports up to 1024 instances of 802.1

A.

802.1s supports up to 1024 instances of 802.1

Answers
B.

802.1 s is a Cisco enhancement to 802.1w.

B.

802.1 s is a Cisco enhancement to 802.1w.

Answers
C.

802.1s provides for faster convergence over 802 1D and PVST+.

C.

802.1s provides for faster convergence over 802 1D and PVST+.

Answers
D.

CPU and memory requirements are the highest of all spanning-tree STP implementations.

D.

CPU and memory requirements are the highest of all spanning-tree STP implementations.

Answers
E.

802.1s maps multiple VLANs to the same spanning-tree instance

E.

802.1s maps multiple VLANs to the same spanning-tree instance

Answers
Suggested answer: C, E
Total 330 questions
Go to page: of 33